1 / 0

Protecting Browsers from Cross-Origin CSS Attacks

Protecting Browsers from Cross-Origin CSS Attacks. Lin- Shung Huang, Zack Weinberg Carnegie Mellon University Chris Evans Google Collin Jackson Carnegie Mellon University. 17 th ACM CCS (October, 2010). Outline. Introduction Threat Model Cross-Origin CSS Attacks Example Attacks

monita
Download Presentation

Protecting Browsers from Cross-Origin CSS Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Browsers from Cross-Origin CSS Attacks

    Lin-Shung Huang, Zack Weinberg Carnegie Mellon University Chris Evans Google Collin Jackson Carnegie Mellon University 17th ACM CCS (October, 2010)
  2. Outline Introduction Threat Model Cross-Origin CSS Attacks Example Attacks Defenses Experiment Related Work A Presentation in Advanced Defense Lab
  3. Introduction Web-hosted applications have supplanted traditional desktop applications for almost everything that requires network communication. A Presentation in Advanced Defense Lab
  4. Injection Attacks (A Simple Example) A Presentation in Advanced Defense Lab
  5. Same-Origin Policy [link] The same-origin policy is the basic principle used to secure Web applications from each other. A Presentation in Advanced Defense Lab
  6. A Web Page Contain… Content HTML Behavior JavaScript Appearance Cascading Style Sheet The first specification of CSS dates to 1996. A Presentation in Advanced Defense Lab
  7. Error-Tolerant Parsing To allow future extensibility, the CSS specification mandates error-tolerant parsing [link]. This leads to a security hole. GreyMagic Security Advisory GM#004-IE (2002) [link] To date, all published attacks of this type have required JavaScript, and most have been specific to Internet Explorer. A Presentation in Advanced Defense Lab
  8. Threat Model Attacker Abilities Sending and receiving arbitrary network traffic from its own servers. Target Behavior Attacker’s Inject strings must pass server-side cross-site scripting (XSS) filters such as HTML Purifier [link]. Victim Behavior The web attacker can entice the victim into visiting its site. A Presentation in Advanced Defense Lab
  9. Cross-Origin CSS Attacks Cross-origin CSS attacks are possible because of existing browser behaviors, reasonable taken in isolation, but with unexpected interactions. A Presentation in Advanced Defense Lab
  10. Browser Behavior Session Authentication Once a user has logged into a web application, their browser will transmit a credential with every HTTP request to that server. A Presentation in Advanced Defense Lab
  11. Browser Behavior Cross-Origin Content Inclusion Requests for cross-origin resources transmit any credentials associated with the site that hosts the resource, not credentials associated with the site whose page made the reference. A Presentation in Advanced Defense Lab
  12. Browser Behavior Error-Tolerant Style Sheet Parsing When browsers encounter syntax errors in CSS, they discard the current syntactic construct, skip ahead until what appears to be the beginning of the next one. CSS parsing mode [link] Quirks mode Strict/standards mode <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> A Presentation in Advanced Defense Lab
  13. Browser Behavior Principles of error-tolerant style sheet parsing Even while skipping, parentheses, square brackets, and curly braces must be properly balanced and nested. The next syntactic construct might begin after the next semicolon, after going up one brace level, or after the next brace-enclosed block. The end of a style sheet closes all open constructs without error. A Presentation in Advanced Defense Lab
  14. Attack Steps In a cross-origin CSS attack, the attacker injects strings into the target document that bracket the data to be stolen. A Presentation in Advanced Defense Lab
  15. CSS String Injection A Presentation in Advanced Defense Lab
  16. Cross-Origin CSS Import When the victim user visits attacker.com <LINK REL="stylesheet" HREF="http://target.com">or<STYLE>@import url(http://target.com);</STYLE> A Presentation in Advanced Defense Lab
  17. Confidential Data Extraction A Presentation in Advanced Defense Lab
  18. A Presentation in Advanced Defense Lab
  19. Attack Limitations Insufficient Injection points The attacker must inject two strings into the document containing the secret. Quotes If the secret contains both types of quotes, or the attacker cannot predict which type of quotes it will contain, the attack may fail. A Presentation in Advanced Defense Lab
  20. Attack Limitations Line Breaks Internet Explorer permits unescaped line breaks in CSS string constants and url()s. Character Escapes Forcing UTF-7 <LINK REL="stylesheet“ REF=“http://target.com” CHARSET="utf-7"> {}#f{font-family:+ACI- A Presentation in Advanced Defense Lab
  21. Attack Limitations Forcing UTF-7 <LINK REL="stylesheet“ REF=“http://target.com” CHARSET="utf-7"> {}#f{font-family:+ACI- A Presentation in Advanced Defense Lab
  22. Example Attacks The Internet Movie Database (IMDb) [link] allows registered users to rate films, make posts on message boards, and send private messages to each other. A Presentation in Advanced Defense Lab
  23. IMDb Example A Presentation in Advanced Defense Lab
  24. Yahoo! Mail Example Send an email to the victim with the subject line: ');} Wait for some time while the victim receives other messages. Send another email to the victim with the subject line: {}body{background-image:url(' A Presentation in Advanced Defense Lab
  25. Yahoo! Mail Example A Presentation in Advanced Defense Lab
  26. Hotmail Example http://mail.live.com/m/ A Presentation in Advanced Defense Lab
  27. Defenses Content Type Enforcement Proposal HTTP header Content-Type: text/css Content-Type: text/html Strict Enforcement Strict enforcement refuses to load any style sheet crossorigin, unless it is properly labeled text/css. content type misconfigurations are common A Presentation in Advanced Defense Lab
  28. Defenses Minimal Enforcement Block if: cross-origin invalid content type syntactically malformed A Presentation in Advanced Defense Lab
  29. Experiment we crawled the top 100,000 web sites ranked by Alexa and identified all of the style sheet resources used by their front pages. A Presentation in Advanced Defense Lab
  30. Result Strict Enforcement 62 sites ≈ 0.06% A Presentation in Advanced Defense Lab
  31. Adoption A Presentation in Advanced Defense Lab
  32. Other Client-Side Approaches Block Cookies Some browsers have the option to block only “third-party” cookies, which prevents cookies from being set by a cross-origin load. But not read… A Presentation in Advanced Defense Lab
  33. Other Client-Side Approaches Block JavaScript Style APIs Many browsers already prevent JavaScript from reading parsed style rules when those rules were loaded cross-origin. A Presentation in Advanced Defense Lab
  34. Server-Side Mitigation Newlines Internet Explorer HTML Encoding Avoid Ambient Authentication However, if a URL with a credential becomes visible to the victim user (e.g. via the location bar), they might be tricked into revealing it. A Presentation in Advanced Defense Lab
  35. Related Work Content-Sniffing XSS Barth et al IE 8 [link] A Presentation in Advanced Defense Lab
  36. Cross-Site Script Inclusion [link] A Presentation in Advanced Defense Lab
  37. Cross Channel Scripting(XCS) A Presentation in Advanced Defense Lab
  38. Same Origin Mutual Approval (SOMA) A Presentation in Advanced Defense Lab
  39. Content Security Policy(CSP) Firefox 4.0 [link] Http Response Header X-CONTENT-SECURITY-POLICY A Presentation in Advanced Defense Lab
  40. Gazelle Browser [link] Microsoft Research(February , 2009) Strict enforcement A Presentation in Advanced Defense Lab
  41. Thank You A Presentation in Advanced Defense Lab
More Related